List three of the six general requirements for the role of physical security professional.

What will be an ideal response?


1. Design and implement enterprise continuity
2. Implement incident management
3. Evaluate personnel security
4. Manage, design, implement, and evaluate physical and environmental security
5. Evaluate procurement
6. Implement risk management

Computer Science & Information Technology

You might also like to view...

The List interface is implemented by the ________ class.

a) array b) ArrayList c) String d) Object e) Exception

Computer Science & Information Technology

Discovery of the pattern of traffic between parties is a __________ attack.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

The lightweight system that has high-end processing and video capabilities built into it is a(n) ________

A) notebook B) ultrabook C) netbook D) tablet computer

Computer Science & Information Technology

When creating an assignment statement, which symbol is used for the assignment operator?

A. == B. = C. >> D. +=

Computer Science & Information Technology